The recent emergence of diverse platform-based media devices such as smart phones and iPads has aroused interest of consumers all across the world. This interest has led to digitalization of paper books and a steep growth in the digital publishing industry at home and abroad. However, advent of various devices and content has caused the issue of compatibility and produced needs and demand for standardization to exchange and share content related to digital publication. Through collection of opinions of 16 stakeholders from the industrial, academic, research, and public sectors, this study aims to examine predictable future changes about content and its distribution, devices, standardization, technical protective measures, and obstacles in future digital publishing and eventually to draw out areas and elements for future standards development.

Due to the widespread propagation of mobile platforms such as smartphones and tablets, financial and e-commercial transactions based on these mobile platforms are growing rapidly. Unlike PCs, almost all mobile platforms do not provide physical keyboards or mice but provide virtual keypads using touchscreens. For this reason, an attacker attempts to obtain the coordinates of touches on the virtual keypad in order to get actual key values. To tackle this vulnerability, financial applications for mobile platforms use secure keypads, which change position of each key displayed on the virtual keypad. However, these secure keypads cannot protect users` private information more securely than the virtual keypads because each key has only 2 or 3 positions and moreover its probability distribution is not uniform. In this paper, we analyze secure keypads used by the most financial mobile applications, point out the limitation of the previous research, and then propose a more general and accurate attack method on the secure keypads.

Recently in the field of IT, cloud computing technology has been deployed rapidly in the current society because of its flexibility, efficiency and cost savings features. However, cloud computing system has a big problem of vulnerability in security. In order to solve the vulnerability of cloud computing systems security in this study, impact types of virtual machine about the vulnerability were determined and the priorities were determined according to the risk evaluation of virtual machine`s vulnerability. For analyzing the vulnerability, risk measurement standards about the vulnerability were defined based on CVSS2.0, which is an open frame work; and the risk measurement was systematized by scoring for relevant vulnerabilities. Vulnerability risk standards are considered to suggest fundamental characteristics of vulnerability and to provide the degree of risks and consequently to be applicable to technical guides to minimize the vulnerability. Additionally, suggested risk standard of vulnerability is meaningful as the study content itself and could be used in technology policy project which is to be conducted in the future.

As mobile terminal environment gets matured, the use of Android platform based mobile terminals has been growing high. Recently, the number of attacks by malicious application is also increasing as Android platform is vulnerable to private information leakage in nature. Most of these malicious applications are easily distributed to general users through open market or internet and an attacker inserts malicious code into malicious app which could be harmful tool to steal private data and banking data such as SMS, contacts list, and public key certificate to a remote server. To cope with these security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile device and take an appropriate action to protect the system against malicious attacks. In this sense, this paper aggregates diverse system events from multiple mobile devices and also implements a system to detect attacks by malicious application.

In recent years, smart devices have changed the paradigm of education. However, the educational environment and teaching methods could not catch up with this fast improvement and an utmost need for development of educational methods has been realized. In this paper, the general usage of smart devices by elementary school teachers is analyzed and the methods through which smart devices are utilizing smart learning is discussed in the result. A survey of 221 elementary school teachers in Gangwon Province showed that 87.7% of them are currently using smart devices. In addition, teachers were using smart devices with not much difference from ordinary people. The three main motives of teachers who were already using smart devices and those who were planning to take advantage of smart devices were innovativeness, usability and easiness. The reason of need to apply smart devices in education is because of its functionality in various learning types, courses and teaching-learning process methods. Although smart devices have a high efficacy in education but they are not widely utilized yet. In order to solve these problems and be able to take more advantage of smart devices in education, teachers should learn how to use smart devices and a strong sense of willingness is required to make changes in the educational methods. The results of this research on elementary school teachers can be further developed for a greater smart device based smart learning.

Recently to take actions to environmental changes like rapid development of IT techniques and acceleration of internal and external competitions etc, domestic universities are conducting projects for establishment and upscaling of integrated information system. In this regard, in this study, the status of integrated information system of national and private universities was analyzed in order to deduce environmental factors for establishment of integrated information system of higher education institutions out of the recognition that environmental factors also are important factors in making the information system a success, and on such basis, 3 environmental factors and 21 detailed measurement items to be considered in establishing integrated information system of higher education institutions were deduced, and plan for successfully application of such integrated information system to the universities that intend to establish integrated information system was proposed. It is anticipated that this study results will be utilized as basic data for successfully establishment of integrated information system in universities when they establish integrated information system.

In wireless networks, efficient mobility management to support of mobile users is very important. Several mobility management schemeshave been proposed with the aim of reducing the signaling traffic of MN(Mobile Node). Among them, PMIPv6 (Proxy Mobile IPv6) is similar with host-based mobility management protocols but MN does not require any process for mobility. By introducing new mobile agent like MAG (Mobile Access Gateway) and LMA (Local Mobility Anchor), it provides IP mobility to MN. In this paper, we propose the analytical model to evaluate the mean signalingdelay and the mean bandwidth according to the type of MN mobility. As a result of mathematical analysis, MF-PMIP (Multicasting-based FastPMIP) outperforms compared to F-PMIP and PMIP in terms of parameters for the performance evaluation.

Mobile device can get useful user information, because users have always this device. In this paper, we propose automatically story generation method and user topic extraction using user information in mobile environment. Proposed method is follows: (1) We collect user action information in mobile device. Then, (2) we extract topics from collected information. (3) For the results of (2), we determine episodes for one day. Then, (4) we generate sentences using sentence templates and we compose stories which have theme-based or time-based. Because proposed method is simpler than previous method, proposed method can work only in mobile device. There`s no room to leak user information. And proposed method is expressed more informative than previous method, because proposed method is provided sentence-based result. Extracted user-topic, a result of our method, can use to analyze user action and user preference.